Linux Kernel Analysis
Much has been written in praise of the Linux (Crandall, Wu, Chong, 359),
(Parnas, 112), (Baliga, Iftode, Chen, 323), and its use of preemptive multitasking memory architectures to manage process control, file management, device management, information maintenance and communications subsystems securely and effectively. The Linux modular design, lack of reliance on Remote Procedure Calls (RPC), and use of UNIX-based system administration all are often cited as factors in how it is significantly more secure than Microsoft Windows for example. Linux relies on a dedicated memory partition architecture more comparable to Microsoft Windows than UNIX and also has a specific API calls for each of the subsystems as well. The combination of modularity and preemptive multitasking through dedicated memory structures is also an architectural argument that Linux supporters site when defending the inherent security of this operating system. In fact the KDE and GNOME components of the operating system are monolithic, not modular in design and therefore pose a security risk from the standpoint of being accessible through the kernel. Figure 3, Linux Kernel Structure, provides a graphical representation.
Figure 3: Linux Kernel Structure
Source: (Jaeger, Edwards, Zhang, 7)
What is immediately apparent from analyzing the Linux kernel is that when you take into account its wide variation in interpretation between Linux distributions from Debian, Red Hat, MandrakeSoft and SUSE it is clear that coordination and collaboration to resolve severe security risks can be challenging. In fact the highly fragmented nature of the Linux kernel and the distributed ownership of it across all those companies who are offering unique distributions make response time to severe alerts (as defined by CERT's methodology) challenging. Further exacerbating this shared ownership of security on the Linux platform is the integration of only Crypto functions, IPSec, SSL Tunnel and firewall functions. All other functions critical for operating system security are in fact supported through 3rd party partners including Directory Support, PKI integration, Cryptography at the hardware level, Kerberos support and a security management framework. As a result of the Linux kernel structure and operating system infrastructure being so balkanized the days of risk associated with any attack and the response time to resolve them is significantly longer than any Microsoft operating system included in the analysis (Massel, et.al.). This is a function of the lack of concerted, focused collaboration on the part of companies who are creating and marketing Linux distributions. Unlike the Apple operating system and its QuickTime and Java Virtual Machine (JVM) security liabilities, Linux has more complex security threats. At the operating system, kernel and the threat of days of risk growing rapidly due to a lack of shared knowledge (despite the myth of the open source community being egalitarian) Linux has significant security vulnerabilities (Massel, et.al.).
Microsoft Windows Operating System Architecture Analysis
The Microsoft Windows architecture has evolved to support pre-emptive multitasking and also the support of up to four concurrent application environments including Win!6, Win32, POSIX and UNIX emulations on the Windows XP Server architecture, which is the processor to Windows 7. As can be seen from Figure 4, Microsoft Windows Operating System Structure the Windows API Layer includes Win16 (16 bit Windows Subsystem) and Win32 (Windows 32 Bit Subsystem) support both with their own kernels (KRNL386.EXE and KERNEL32.DLL) in addition to their own GID and user components. These two subsystems in the API layer are completely separated from the Kernel Mode. Microsoft initially made this design decision from a security standpoint. There is also a Hardware Abstraction Layer (HAL) within the architecture which supports cryptography customization to MIL-STD specifications.
Figure 4: Microsoft Windows Operating System Structure
Source: (Shone, et.al.)
The Windows Operating Structure integrated directory support, PKI, cryptography functions at the kernel and hardware levels through the hardware Abstraction Layer, while also having legacy support for Kerberos authentication and security technologies. IPSec, SSL and remote access have over time been integrated into a common subsystem which runs in its own memory space. The System Virtual Machine also has its own memory partition and is an emulation of a full Win32 runtime environment instead of making calls directly into the kernel of the operation system. Win16 and Win32-based applications therefore are not integrated to the kernel; therefore applications cannot be used to launch security attacks. Vulnerabilities within the Microsoft architecture emanate from device driver layer (Hartley, 4) and the lack of consistency on firewall definitions and methodologies over the lifecycle of the operating system (Mogull, Pepper, 1). Microsoft has also been negligent in defining common platform integration for third party systems, databases and architectures as well (Parnas, 112). These have all combined to create security liabilities for the operating system over time. In previous generations of the Microsoft architecture,...
Careful planning is vital due to the first 9 lessons listed here, that BI solutions: must probably be purchased by multiple providers; requires company it specialists who are well-versed in up-to-date BI solutions; are expensive; are time-consuming; take meaningful intra-company education; require the work of a consequential number of company personnel; should involve only necessary outsourcing with an eye toward educating personnel; require anticipation of change and willingness to
The theory has three factors: Valence Instrumentality Expectancy Equity Theory -- Stated that a person compares their outcomes and inputs with others. Sarah has a meeting to discuss the salary of the whole entire organization. They realized that women were low paid in comparison to the men. Sarah started comparing herself with one of her colleagues saying that she worked harder than him and she has been there longer than him. Satisfaction performance theory
Genetic Technology - Stem Cell Research Stem Cells There has been an abundance of controversy over the past several years regarding the research of stem cells. Proponents of this particular branch of research claim that the usage of stem cells can create virtually unparalleled medical advantages for future generations. Opponents of the utilization of stem cells cite the fact that the research is unethical, primarily since it causes death in embryos to
Web Technology Effective Teaching Extant literature has attempted to explore the concept of an effective teacher. The question of what constitutes an effective teacher is one that is asked by several stakeholders in the educational sector. According to The Teaching and Learning Center at Winthrop University, an effective teacher is defined as a scholar who uses an appropriate methodology in the sharing of knowledge, demonstrates as well as encourages a high level
Internet Usage on our Lives: A Critique of the Shallows The pervasive adoption of the Internet continues to completely redefine the nature and scope of people's lives and their ability to communicate and collaborate globally. The Internet is also enabling entirely new approaches to defining methods of co-creation with customers, in addition to the creation and growth of virtual work teams (Panteli, Duncan, 2004). From friends who connect and communicate
This difficulty has given rise to numerous theories of motivation throughout history, each with its own distinct value. Many generations after Adam, have created new and insightful methods of thought. The problem with many of these theories is that they are imperfect by nature and do not encompass all possible options of behavior. To begin, Elliot defines motivation as a basic innate drive for success. This drive encompasses the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now